local nuance(passive) to be influenced byprotocol use
as a simpler alternative(passive) is designedProtocol debugwire
as a simpler alternative to JTAG(passive) is designedProtocol debugWIRE
to provide primarily file transfer , but also more general file system access on the remote server - in secure manner(passive) is designedprotocol
onto the Spell / Trap Zone(passive) can be setAltergeist Protocol
to provide massive scalability using IP multicast as the underlying network service(passive) is specifically designedprotocol
to act as a second factor to strengthen existing username / password - based login flows(passive) is designedU2F protocol
resolve the appearance of a shingles lesions(passive) is designedareThis protocol
to make it easier to modify parameters and update protocols(passive) has been carefully designedTezos protocol
to provide Internet server programs with a way to know if a particular IP address is currently allocated to a known ( trusted ) user and ( optionally ) with the identity of the said user(passive) is designedprotocol
of rules used to define communication between two devices(passive) is setProtocol
a Software Defined Protocol Network Node - A softwaredesignedprotocol
to allow servers to be as simple and general as possible(passive) is designedprotocol
protocol Allow rules to trackoriginatingprotocol
to provide primarily file transfer , but also more general file system access on ... FTP Component(passive) is designedprotocol
of rules by which devices can be able to communicate between them(passive) is setProtocol
to provide primarily file transfer , but also more general file system access on(passive) is designedprotocol
to give these processes and devices a + lightweight way to access information that may be critical to their + operation(passive) is designedprotocol
for use in ad hoc mobile networks(passive) is designedprotocol
to provide privacy between two communicating applications ( a client and a server ) , and to authenticate the server and(passive) is designedProtocol
for highly dynamic application scenarios in wireless ad - hoc networks(passive) was designedprotocol
to provide privacy between two communicating applications ( a client and a server ) , and to authenticate the server and ( optionally ) the client(passive) is designedProtocol
for standard packet radio networks and their(passive) is designedprotocol
to provide privacy between two communicating applications ( a client and a server(passive) is designedProtocol
Basic Network TestresultsProtocol
for IoT sensor network applications(passive) is designedprotocol
for the exchange of routing information between routers(passive) is designedprotocol
Each layer of the protocol(passive) is designedProtocol
Full instructions on usedesignedProtocol
for use in ad hoc networks(passive) has been designedprotocol
by the Internet Engineering Task Force ( IETF(passive) designed byprotocol
to work on typical home networks(passive) is designedprotocol
please include the URL of the website used to carry out the analysisresultsProtocol
to match local protocol with HeartStart Event Review software(passive) can be setProtocol
to run over an unreliable transport such as UDP / IP and a message(passive) is designedprotocol
to improve your connection speed and latency(passive) goodThis ... is designedprotocol
to set order(passive) is designedProtocol
by the Internet Engineering Task Force(passive) designed byprotocol
to communicate data through noisy RF environments that are common in commercial and industrial applications(passive) is designedprotocol
the " helpsetprotocol
where your calls are coming fromto discoverwhere your calls are coming from
for this systemdesignedfor this system
for MANETsspecially designedfor MANETs
in 33 % reduction in the size of the skull lesionsresultedin 33 % reduction in the size of the skull lesions
for constrained devices and low - bandwidth , high - latency or unreliable networksdesignedfor constrained devices and low - bandwidth , high - latency or unreliable networks
to exchange routing and reachability information among autonomous systems ( AS ) on the Internetdesignedto exchange routing and reachability information among autonomous systems ( AS ) on the Internet
for Transmission Control Protocol / Internet Protocol ( TCP / IP ) networksdesignedfor Transmission Control Protocol / Internet Protocol ( TCP / IP ) networks
for use in multi - hop wireless ad hoc networks of mobile nodesdesignedfor use in multi - hop wireless ad hoc networks of mobile nodes
to allow seamless discovery , configuration , monitoring and management of all of the various devices on your networkdesignedto allow seamless discovery , configuration , monitoring and management of all of the various devices on your network
for Transmission Control Protocol / Internetdesignedfor Transmission Control Protocol / Internet
to provide communication security over the Internetdesignedto provide communication security over the Internet
to provide communication security for Internetdesignedto provide communication security for Internet
for ad hoc networks of mobile nodes with location informationdesignedfor ad hoc networks of mobile nodes with location information
for Transmission Control Protocol Internet Protocol ( TCP IPdesignedfor Transmission Control Protocol Internet Protocol ( TCP IP
to allow mobile device users to move from one network to another while maintaining a permanent IP addressis designedto allow mobile device users to move from one network to another while maintaining a permanent IP address
for IoT sensor network applicationsis designedfor IoT sensor network applications
to scale better than the existing multicast routing protocols when there are many multicast groupsdesignedto scale better than the existing multicast routing protocols when there are many multicast groups
to support bandwidth intensive applications in wireless personal area networks ( WPANsis designedto support bandwidth intensive applications in wireless personal area networks ( WPANs
to ANY and protocol set only to TCP - of coursesetto ANY and protocol set only to TCP - of course
the transport protocol for the port trigger - TCP or UDPSetsthe transport protocol for the port trigger - TCP or UDP
for mobile multi - hop wireless ad hoc networksdesignedfor mobile multi - hop wireless ad hoc networks
to provide a flexible data communication for exchanging SMS messagesdesignedto provide a flexible data communication for exchanging SMS messages
specifically for use in multi - hop wireless ad hoc networks of mobile nodesdesignedspecifically for use in multi - hop wireless ad hoc networks of mobile nodes
for highly dynamic application scenarios in wireless ad - hoc networkswas designedfor highly dynamic application scenarios in wireless ad - hoc networks
for wireless and mobile ad hoc networkis designedfor wireless and mobile ad hoc network
to move very large files over wide area high - speed networks Descriptionspecifically designedto move very large files over wide area high - speed networks Description
for the exchange of routing information between routersis designedfor the exchange of routing information between routers
to exchange routing information between routersis designedto exchange routing information between routers
to allow clients to find servers # offering particular servicesspecifically designedto allow clients to find servers # offering particular services
to exchange routing and reachability informationdesignedto exchange routing and reachability information
with the transfer of multimedia data in minddesignedwith the transfer of multimedia data in mind
with the purpose of mobile ad hoc networksdesignedwith the purpose of mobile ad hoc networks
for resource limited nodes in constrained networksdesignedfor resource limited nodes in constrained networks
to run on IP networks's designedto run on IP networks
to synchronize the clocks of computers over a networkdesignedto synchronize the clocks of computers over a network
the protocol value for the generated keySetsthe protocol value for the generated key
long response time in high latency WANcauselong response time in high latency WAN
in the system computer 16 or one of the slave devices 20originatingin the system computer 16 or one of the slave devices 20
for wireless sensor networksdesignedfor wireless sensor networks
to provide reliable network communication between nodesis designedto provide reliable network communication between nodes